News & Analysis as of

Data Protection Data Breach Law Practice Management

Integreon

Best Practices for Cyber Incident Prevention for Law Firms

Integreon on

In our global, digital-first economy, cyberattacks are no longer isolated incidents targeting large organizations. They are a very real threat to businesses of all types and sizes, and law firms are a common target of cyber...more

Clark Hill PLC

[Webinar] Cybersecurity Resilience in Law Firms - March 6th, 9:00 am PT

Clark Hill PLC on

The legal profession faces unprecedented challenges in securing sensitive client data and maintaining the integrity of digital practice. This webinar focuses on law firms seeking useful information about robust cybersecurity...more

TransPerfect Legal

[Webinar] Ethics, Cybersecurity, Privacy, and Data Protection - March 8th, 9:00 am - 10:15 am PST

TransPerfect Legal on

Join our CLE webinar, "Ethics, Cybersecurity & Data Protection: Mastering Competent Representation," as we explore reasonable steps needed for lawyers to comply with the duty of providing competent representation. Dive into...more

Esquire Deposition Solutions, LLC

Rx for Law Firm Cyberthreats: Planning, Training, and Vendor Due Diligence

We’re all familiar with the adage that, for businesses, the question is not “if” but “when” a data breach or ransomware attack will occur. The odds of a cyberattack aren’t as high as death and taxes but they’re approaching a...more

Butler Snow LLP

What Lawyers Need to Know About Cybersecurity | Dennis Van Metre | Texas Appellate Law Podcast

Butler Snow LLP on

As technology becomes more sophisticated, so too do the security issues its users encounter. These challenges impact attorneys and law firms particularly, as they regularly deal with confidential data and privileged...more

Esquire Deposition Solutions, LLC

Staying Secure in the New Hybrid Workplace

Most observers believe that the legal profession is rapidly moving toward so-called “hybrid workplaces,” a term office managers use to describe a mixed-work environment that spans brick-and-mortar law offices, home offices,...more

Oberheiden P.C.

Cybersecurity Compliance Programs for Law Firms

Oberheiden P.C. on

Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more

Blank Rome LLP

ABA Issues Formal Opinion Detailing Lawyer Obligations Relating to Cyber Attack Incidents

Blank Rome LLP on

Law firms—more so than other business entities—are prime targets, and victims, of computer-network penetration and data theft. Law firms have access to their clients’ personal information, including sensitive, heavily...more

Epiq

ABA Issues Opinion - How To Respond to Data Breaches

Epiq on

In 2018, 1,244 data breaches occurred in the U.S. with over 445.6 million records exposed with a cost of $654 billion. Lawyers make a promise to safeguard confidential client data when they enter into an attorney-client...more

Fisher Phillips

Attorneys Must Consider Ethical Obligations Associated with a Data Breach

Fisher Phillips on

Most attorneys are well aware of statutory obligations that require private and governmental entities to notify individuals of data breaches that involve the loss or disclosure of personally identifiable information. An area...more

BCLP

GDPR’s Most Frequently Asked Questions: What are a law firm’s obligations under the GDPR in the event of a data security breach?

BCLP on

The European Union's General Data Protection Regulation ("GDPR") is arguably the most comprehensive - and complex - data privacy regulation in the world. Although the GDPR went into force on May 25, 2018, there continues to...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide